Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
719be2a7e0f7dfd0aba67017ec2966cb.exe
Resource
win7-20231215-en
General
-
Target
719be2a7e0f7dfd0aba67017ec2966cb.exe
-
Size
220KB
-
MD5
719be2a7e0f7dfd0aba67017ec2966cb
-
SHA1
7f64efceb554aed2ddf665ebfca47eaa71ab3677
-
SHA256
3b47910e69e7050a8f0225fd3bdfc003802b392e12519f5f2413462e6481e47a
-
SHA512
ca95c58fc4d5aed75c1d6c6c95b799fde9c7665dcce3aab5c47971a53324977e0211206cd1f17659c4f5de3fda632dbacc0be62e5c79d8d4b384506856f4e143
-
SSDEEP
3072:GMsCUsER3Fx/asAm3jUWvUIYeMYqFquq8RnPZKlNkfKN5CS+t9CpZ+AS7P1ZBGjh:GMsCUpR35iLs8WD4HCGX7BGqy+lY
Malware Config
Extracted
ramnit
26
��1:8001
-
campaign_timestamp
1.505981184e+09
-
compile_timestamp
1.500910876e+09
-
dga_seed
7.90544302e+08
-
listen_port
0
-
num_dga_domains
40
Extracted
ramnit
��1
��1:8001
-
campaign_timestamp
1.505981184e+09
-
compile_timestamp
1.500910876e+09
-
dga_seed
7.90544302e+08
-
listen_port
0
-
num_dga_domains
40
Signatures
-
Deletes itself 1 IoCs
Processes:
wmplayer.exepid process 3008 wmplayer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
WScript.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hnvtxcwy = "C:\\Users\\Admin\\AppData\\Roaming\\hnvtxcwy\\wauvgwuh.vbs" WScript.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
719be2a7e0f7dfd0aba67017ec2966cb.exedescription pid process target process PID 4980 set thread context of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 set thread context of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe -
Modifies registry class 1 IoCs
Processes:
wmplayer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings wmplayer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wmplayer.exepid process 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe 3008 wmplayer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
719be2a7e0f7dfd0aba67017ec2966cb.exepid process 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
719be2a7e0f7dfd0aba67017ec2966cb.exewmplayer.exedescription pid process Token: SeDebugPrivilege 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe Token: SeSecurityPrivilege 3008 wmplayer.exe Token: SeDebugPrivilege 3008 wmplayer.exe Token: SeRestorePrivilege 3008 wmplayer.exe Token: SeBackupPrivilege 3008 wmplayer.exe Token: SeDebugPrivilege 3008 wmplayer.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
719be2a7e0f7dfd0aba67017ec2966cb.exewmplayer.exedescription pid process target process PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 4980 wrote to memory of 3008 4980 719be2a7e0f7dfd0aba67017ec2966cb.exe wmplayer.exe PID 3008 wrote to memory of 3620 3008 wmplayer.exe WScript.exe PID 3008 wrote to memory of 3620 3008 wmplayer.exe WScript.exe PID 3008 wrote to memory of 3620 3008 wmplayer.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\719be2a7e0f7dfd0aba67017ec2966cb.exe"C:\Users\Admin\AppData\Local\Temp\719be2a7e0f7dfd0aba67017ec2966cb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Deletes itself
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\hnvtxcwy\egcleujc.vbs"3⤵
- Adds Run key to start application
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\hnvtxcwy\egcleujc.vbsFilesize
193B
MD54b5db122f9ddd488222c6b25cb7b165a
SHA1f82689bccc194c041fd1458154f5fbe73ad48062
SHA2564ae62b4e6df73ea2aeac97abf7589e879c3e5e4678f6e278870979361f14846a
SHA512b967cc3fada2b7e544c5c9c8001104b740edf78508adf0bbc07ce143290c9f3d2526940b41c69dbbb2e941939210ae9895e2052b23de560fd6383ee4081f66b3
-
memory/3008-33-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-60-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-30-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-6-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-7-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-20-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-23-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-24-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-25-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-26-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-27-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-29-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-3-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-2-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-49-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-34-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-36-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-39-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-42-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-1-0x00000000011F0000-0x00000000011F1000-memory.dmpFilesize
4KB
-
memory/3008-47-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-31-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-52-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-54-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-56-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-59-0x00000000011B0000-0x00000000011F0000-memory.dmpFilesize
256KB
-
memory/3008-0-0x0000000000BC0000-0x0000000000BC1000-memory.dmpFilesize
4KB